O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Logical Design, Topology, and Operations

Once investigators have moved past risk analysis and physical requirements and decided on a dual-network environment, they have several difficult choices for implementing the network infrastructure from a topological standpoint.

When both the administrative network and the operational lab network are separated physically and are intended to be kept that way, one of the greatest concerns from a security standpoint is cross-connect. In a cross-connect situation, where the investigator has inadvertently connected the forensics lab to a less-protected network environment, the risk of exposure can be higher. Logical design implementations, such as configuring specific systems to not accept packets from other ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required